How the mainframe can defend against hacker intrusion

Source: Internet
Author: User
Tags sql injection attack

At the beginning of the rise of the mainframe, its use environment was extremely secure. You can connect the terminal system to the mainframe so that the mainframe can control the access paths and permissions of data storage and the user's usage information and sources.
However, today we are using a Service-Oriented Architecture (SOA). A series of computers send requests before connecting to the backend system. Users are also divided into different levels. Therefore, the backend of the mainframe cannot actually determine the real identity and authorization location of the user. Therefore, in the field of distributed computers, when users are preparing to access mainframe data, the security situation becomes worrying.

In addition, there are only a handful of experts who really know about the mainframe-most of them have now retired from the second-line. As a result, there are more and more internal and external problems when users access the mainframe and share data.

Mainframe is a treasure

Willie sutton was a famous bank thief in 1820s. After he was captured, someone asked him, "Why did you rob a bank ?" He honestly replied, "because there is money ".

If Willey can survive today, I bet he must be a hacker who intrude into the terminal database, because money is there, or at least there is valuable information. The mainframe is a coveted target for malicious computer hackers. A typical practice of hackers is to read data under the protection of network protocols. When the mainframe sees protocols such as FTP or HTTP, it will basically be approved. If this is an SQL injection attack, then the mainframe will be powerless at all.

Mainframe security assurance

Instead of constantly installing mainframe applications, it is better to take this opportunity to add infrastructure features in a timely manner. After all, it is not easy to develop applications. Therefore, it is very effective to add additional security layers to external security functions such as databases, application software, or network servers.

This separate layer makes up for Security Authentication gaps. For example, if a hacker steals a user's password and bypasses the security verification system, the user has another security layer permission to access data. Therefore, it is critical to add security lines and in-depth protection measures with higher permissions.

In-depth protection process

First, separation of authority can help defend against internal and external attacks. Setting up the network application software firewall is the first line of defense against hacker attacks, which is also equivalent to blocking the security grid outside the door of wilsaton.

Second, you need to prevent the risk of data outflow. Separate intrusion detection and review are far from enough. You need to prevent data theft in unexpected circumstances, so you need to find a proper method to lock the data. Encryption technology is the best method. If it can be used correctly, this is the only way to protect you from the risk of data leakage.

Intrusion detection is also the basic method. If your system is in danger, you must set up a protection layer to prevent attackers from intruding into the system to steal data. Protegrity owns a technology patent that limits the data traffic it accesses based on the history of users' regular activities on the system.

For example, if someone downloads 500 million records every day in a week, there is no access volume on weekends. Then our system will identify a person's data downloads of no more than 10,000, or the weekend evening cannot download data.

Finally, monitor your users. Once you lock the data, you need to pay attention to its running status. Are there any unauthorized requests? Is there any hacker attack attempt? You must pay attention to these issues. Users can stop misuse of data in a timely manner.

It can be seen that there are three major factors for mainframe security: network application software firewall, encryption technology and monitoring measures.

Security checks on all aspects of the mainframe security protection pillar

It is time to perform a comprehensive inspection on the previously ignored Security Systems. For example, check your database to see if someone is trying to read credit card information from your database. If you find that a hacker accesses credit card information as a valid user, we should add corresponding function settings for the amount of data accessed by the hacker.

If your user identity is dangerous, you should set up a protection layer to prevent intruders from obtaining more information. You can also use data control to detect intrusion or prevent hacker attacks. Currently, we have obtained a patent license for the behavior-based intrusion detection technology. We developed this technology because I think it is quite effective in the data-driven protection layer.

It is natural to restrict behavior-based access to the physical world. Just like taking medicine by party or taking money at the ATM quota. These are all very successful security systems that can logically limit people's behaviors. I think this method also applies to security protection in the IT field.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.